[tor-talk] messing with XKeyScore

Sebastian Hahn mail at sebastianhahn.net
Sat Jul 5 13:18:10 UTC 2014

On 05 Jul 2014, at 15:08, Roman Mamedov <rm at romanrm.net> wrote:

> On Sat, 5 Jul 2014 03:59:28 +0000
> Matthew Finkel <matthew.finkel at gmail.com> wrote:
>> This problem makes me sad on many levels, and I'm not opposed to
>> implementing mitigation techniques (within reason) based on the
>> rulesets, however we shouldn't do anything that will hurt our users nor
>> should be do anything that makes tor more difficult to use
>> (unfortunately this includes sending users bogus bridge addresses).
> Well, what is the format of a E-Mail response with a bridge list?
> If it's just plain text, why not instead send them as a picture in attachment,
> with bridge IP addresses encoded in CAPTCHA style to not be machine-readable.

Because it makes it harder for humans to use, and doesn't help. Watching
the bridge authority gives you a list of bridges, too - no need to read

There are no "quick fixes" to global surveillance, and we shouldn't
forget our users when deploying questionable countermeasures.

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 455 bytes
Desc: Message signed with OpenPGP using GPGMail
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20140705/94244a92/attachment.sig>

More information about the tor-talk mailing list